Return to Article Details Handling Information Security Wisely Utilising the Aggressive Cuckoo Search Algorithm in Lock Systems Download Download PDF